Key IT Trends and Best Practices.

Overview

Join your peers by registering now. Gather the key IT knowledge needed to be indispensible. This year's Tech Summit agenda is carefully designed to provide you with the latest IT trends and knowledge needed to make the best possible decisions on behalf of your organization. It will allow you to see the best practices other leading companies have adopted, key IT challenges they are facing, and new solutions that are solving these challenges. The available seating is limited so be sure to sign up as soon as possible to ensure you will have a seat. You are welcome to invite other key people on your team.

Event Series Sponsors

Detailed Agenda

Agenda topics subject to change

9:00 am: Registration Open, Signature Refreshments, Peer Networking.
On arrival you will be greeted for check-in, vendor area is open along with the main presentation room with
refreshments being served on arrival. First speaker is on shortly after.
This time is spent networking with your peers and vendors.

9:45 am: New Network and Wireless Technologies.
Designing a local area network from scratch is always fun, the wired side of this presentation will cover issues such as the
latest Network management tools, design complexity to meet the requirements, PoE or not, just 100GB and choices for going beyond,
and redundancy considerations. On the wireless side, although there are many ways to conﬁgure and use Wi-Fi, this session will focus on
some of the newest tools that best-in-class organizations are applying to achieve the following goals out of their wireless networks:

10:15 am: What's New in Backup and Disaster Recovery.
IT disasters happen every day, in every company. With the right preparation, no one ever hears about them. Without it,
these disasters can make the evening news. The first step is to define what your company cannot live without, otherwise known as a
Business Impact Analysis (BIA). Once the mission critical applications have been identified, you must then agree upon what is acceptable downtime
or the recovery time objective (RTO). The difference between zero downtime and fifteen minutes of downtime is significant from a cost perspective.
This session will then cover the new tools available for the actual backup and disaster recovery process including testing.

10:45 am: Trends in Application and Mobile App Development.
Organizations are under pressure to develop and deliver sophisticated cross-platform web applications faster.
This session will discuss the latest development platforms including cloud development platforms and open source frameworks.
How to create more visually compelling models to drive usage and ease of use will also be discussed.
On developing mobile apps this session will cover how to develop with your audience in mind, how to learn from competitors and
like-applications, and key considerations in the user experience and achieving collaboration in both the coding and user experience to build up valuable social value points within your apps.

11:15 am: BYOD Implementation and Management Strategies.
There's little doubt that bring-your-own-device (BYOD) adoption has profoundly changed the enterprise.
By 2017, one-half of organizations will no longer provide devices to their employees, according to industry research.
This is another banner year where personal devices are expected to make a bigger leap forward than ever and with the line between
personal and business blurring, BYOD technology needs to be able to adapt with the changes ahead.

11:45 am: Best Practices in Cloud Utilization & Security.
The goal of any organization is to use IT at its most effective level. For an IT manager cloud sizing doesn’t have
one correct answer, since every environment is truly unique in its demands. A few considerations and best practices.
A Cloud migration project can be a relatively simple exercise, where applications are migrated "as is", to gain benefits such
as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes.
However, there is no business transformation as part of this move. If the expectation is broader strategic capabilities as a result of a move to the Cloud,
it is important to develop a true Cloud migration plan to include core tactics such as:

- Shift to DevOps
- Cloud Containers
- Hybrid Clouds

On the security side, there are different considerations and vulnerabilities specific to each cloud model such as Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). This session will discuss DLAs, security architecture drawings, specialized protections for the perimeter,
firewall secretion, function segregation, and vulnerability analysis.

12:45 pm: End of Main Event and Prize Giveaways
We encourage to you network and discuss the days topic and reach out to any
of our vendors and/or speakers for any addtional information.
Thank you for your time and particpation in our event

Date: October 10, at the Westin San Jose Fee: FREE to Register (Limited Seating so Register
Now).

"Attended and I enjoyed the summit. Learned about services/technologies we could utilize at our company" - Ahmed Mohamed, Software Support Manager, Pharmaworks

"Overall the event was good. There were good vendors that highlighted risks in the area and how their product could help minimize that risk. The location was nice and giveaways are always a bonus." - Beth Gavish, Information Security Officer

"The room setup was good, so was the food. Send me the next date please." - Bill Sandberg, CEO, Rising Sun Systems

"I attended and enjoyed the vendor presentations the best." - John Ball, Director, Information Technology, United Way

"The presenters and presentations were all excellent – I appreciated the breaks that allowed us to talk with the vendors at the tables that presented and to speak with the vendors that were only tabling." - Josette Dzencelowcz, Senior Software Engin. Mgr., Travelport

"I attended and appreciated that there wa a large turnout." - Justin Redifer, Product Development Engineer, ProviderTrust